Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support multiple API keys #801

Open
chucker opened this issue Jul 19, 2024 · 2 comments
Open

Support multiple API keys #801

chucker opened this issue Jul 19, 2024 · 2 comments

Comments

@chucker
Copy link

chucker commented Jul 19, 2024

Is your feature request related to a problem? Please describe.

Currently, the recommended approach to authentication is an API key. However, this only enables you to set one API key for your entire staff. This requires key rotation as soon as one staffer leaks the key and/or leaves the team.

Describe the solution you'd like

Therefore, what I would like is simply the — optional — ability to define multiple API keys, e.g.:

  "ApiKeys": [
    {
      "User": "Frank",
      "Key": "asd"
    },
    {
      "User": "Sarah",
      "Key": "qwe"
    },
    {
      "User": "Kim",
      "Key": "zxc"
    },
  ]

On a technical level,

  • ApiKeys has precedence over ApiKey, if present.
  • The code only really cares about the Key property. The User property is human metadata.

Describe alternatives you've considered

What we do now instead is use IIS to setup HTTP basic auth, but unfortunately, NuGet (whether through dotnet, VS, or Rider) handles HTTP auth very poorly. The recommended path for them, too, appears to be API keys.

@Regenhardt
Copy link

This is now possible using BaGetter 1.5.0 with bagetter#156 merged. It does only support this simple use case for now, but may be extended with scopes or permissions in the future. The creator has had it running for some time now, but more people testing this big of a feature are always welcome.

@chenzuo
Copy link

chenzuo commented Oct 24, 2024

this is a very useful private feature for a small team. regarding the issue of key leakage, I think you can add some features to protect it, such as the key protection method implemented eg.Nuget. i think this feature can meet the needs of many teams.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants